Vulnerabilities > CVE-2006-6424 - Heap Overflow vulnerability in Novell Netmail IMAP Verb Literal
Summary
Multiple buffer overflows in Novell NetMail before 3.52e FTF2 allow remote attackers to execute arbitrary code (1) by appending literals to certain IMAP verbs when specifying command continuation requests to IMAPD, resulting in a heap overflow; and (2) via crafted arguments to the STOR command to the Network Messaging Application Protocol (NMAP) daemon, resulting in a stack overflow. Successful exploitation requires a valid user account. This vulnerability is addressed in the following product update: Novell, NetMail, 3.52e FTF2
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 16 |
Exploit-Db
description | Novell NetMail. CVE-2006-6424. Remote exploit for windows platform |
id | EDB-ID:16813 |
last seen | 2016-02-02 |
modified | 2010-05-09 |
published | 2010-05-09 |
reporter | metasploit |
source | https://www.exploit-db.com/download/16813/ |
title | Novell NetMail <= 3.52d NMAP STOR Buffer Overflow |
Metasploit
description | This module exploits a stack buffer overflow in Novell's Netmail 3.52 NMAP STOR verb. By sending an overly long string, an attacker can overwrite the buffer and control program execution. |
id | MSF:EXPLOIT/WINDOWS/NOVELL/NMAP_STOR |
last seen | 2020-02-29 |
modified | 2017-07-24 |
published | 2007-03-01 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6424 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/novell/nmap_stor.rb |
title | Novell NetMail NMAP STOR Buffer Overflow |
Packetstorm
data source | https://packetstormsecurity.com/files/download/83015/nmap_stor.rb.txt |
id | PACKETSTORM:83015 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | MC |
source | https://packetstormsecurity.com/files/83015/Novell-NetMail-3.52d-NMAP-STOR-Buffer-Overflow.html |
title | Novell NetMail <= 3.52d NMAP STOR Buffer Overflow |
Saint
bid | 21725 |
description | Novell NetMail NMAP STOR command buffer overflow |
id | mail_imap_netmailneg |
osvdb | 31363 |
title | netmail_nmap_stor |
type | remote |
References
- http://secunia.com/advisories/23437
- http://securityreason.com/securityalert/2081
- http://securitytracker.com/id?1017437
- http://www.cirt.dk/advisories/cirt-48-advisory.txt
- http://www.kb.cert.org/vuls/id/381161
- http://www.kb.cert.org/vuls/id/912505
- http://www.securityfocus.com/archive/1/455201/100/0/threaded
- http://www.securityfocus.com/archive/1/455202/100/0/threaded
- http://www.securityfocus.com/bid/21724
- http://www.securityfocus.com/bid/21725
- http://www.vupen.com/english/advisories/2006/5134
- http://www.zerodayinitiative.com/advisories/ZDI-06-052.html
- http://www.zerodayinitiative.com/advisories/ZDI-06-053.html
- https://secure-support.novell.com/KanisaPlatform/Publishing/134/3096026_f.SAL_Public.html